Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-1147

Опубликовано: 15 мар. 2011
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

1:1.8.3.3-1ubuntu1
hardy

ignored

end of life
karmic

ignored

end of life
lucid

released

1:1.6.2.5-0ubuntu1.4
maverick

released

1:1.6.2.7-1ubuntu1.2
natty

released

1:1.6.2.9-2ubuntu2.1
upstream

released

1.4.39.2, 1.6.2.16.2, 1.8.2.4

Показывать по

EPSS

Процентиль: 87%
0.0342
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

nvd
почти 15 лет назад

Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet.

debian
почти 15 лет назад

Multiple stack-based and heap-based buffer overflows in the (1) decode ...

github
больше 3 лет назад

Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet.

EPSS

Процентиль: 87%
0.0342
Низкий

6.8 Medium

CVSS2